Huawei EulerOS 2.0 OpenSSL Cryptographic Module

Certificate #4235

Webpage information

Status active
Validation dates 25.05.2022
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode.
Exceptions
  • Physical Security: N/A
Description The Huawei EulerOS 2.0 OpenSSL Cryptographic Module is a software library supporting the implementation of Transport Layer Security (TLS) protocol v1.2 as well as general purpose approved cryptographic algorithms. The module provides cryptographic services to applications running in the user space of the underlying EulerOS 2.0 operating system through a C language application program interface (API).
Tested configurations
  • Huawei EulerOS 2.0 on FusionServer RH2288 with Intel Xeon E5-2690 processor. Huawei EulerOS 2.0 on Taishan200 with Kunpeng 920 processor.
Vendor Huawei Technologies CO., Ltd.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, DES, Triple-DES, TDES, TDEA, Poly1305, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA256, SHA3-224, SHA3-256, SHA3-384, SHA-3, SHA3-512, MD4, MD5
Schemes
MAC, Key Agreement, Key agreement
Protocols
TLS, TLS 1.2, TLSv1.2, TLS v1.0
Randomness
PRNG, DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-521, P-384
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA

JavaCard API constants
SM2
Trusted Execution Environments
SSC
Vendor
Huawei, Huawei Technologies Co

Security level
Level 1, level 1
Side-channel analysis
Timing Attacks, timing attacks, Timing Attack

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS PUB 197, FIPS 186-4, FIPS PUB 198-1, FIPS PUB 186-4, FIPS PUB 202, FIPS PUB 180-4, FIPS186-4, FIPS 197, FIPS 180-4, FIPS 198-1, FIPS 202, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38D, NIST SP 800-38E, NIST SP 800-38F, NIST SP 800-90A, SP 800-67, NIST SP 800-90B, SP 800-57, SP 800-90, NIST SP 800-67, SP 800-38A, NIST SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38E, SP 800-38F, SP 800-52, NIST SP 800-52, SP 800-56A, NIST SP 800-56A, SP 800-90A, SP 800-131A, NIST SP 800-131A, SP 800-135, NIST SP 800-135, PKCS 1, PKCS#1, RFC 5288

File metadata

Author rivas
Creation date D:20220512145114+02'00'
Modification date D:20220512145114+02'00'
Pages 35
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Incoming
  • 4242 - active - Huawei EulerOS 2.0 OpenSSH Server Cryptographic Module
  • 4246 - active - Huawei EulerOS 2.0 OpenSSH Client Cryptographic Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4235,
  "dgst": "eb2be95b2461aa3e",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "SHA-3#A903",
        "ECDSA#A903",
        "KTS#A903",
        "KAS#A903",
        "KAS-SSC#A903",
        "DRBG#A903",
        "DSA#A903",
        "SHS#A903",
        "CVL#A903",
        "Triple-DES#A903",
        "HMAC#A903",
        "RSA#A903",
        "AES#A903"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4246",
          "4242"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4246",
          "4242"
        ]
      },
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4246",
          "4242"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4246",
          "4242"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 23
          }
        },
        "FF": {
          "DH": {
            "DH": 7,
            "Diffie-Hellman": 26
          },
          "DSA": {
            "DSA": 24
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CCM": {
          "CCM": 6
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 4
        },
        "GCM": {
          "GCM": 15
        },
        "OFB": {
          "OFB": 3
        },
        "XTS": {
          "XTS": 9
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 39
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 37,
            "TLS 1.2": 4,
            "TLS v1.0": 1,
            "TLSv1.2": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 7,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 14,
          "P-256": 16,
          "P-384": 2,
          "P-521": 14
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES-256": 1,
          "PKCS 1": 4,
          "PKCS#1": 2,
          "SHA-1": 7,
          "SHA-3": 2,
          "SHA2- 224": 1,
          "SHA2- 512": 1,
          "SHA2-224": 2,
          "SHA2-256": 4,
          "SHA2-384": 3,
          "SHA2-512": 3,
          "SHA256": 1,
          "SHA3- 512": 1,
          "SHA3-224": 2,
          "SHA3-256": 3,
          "SHA3-384": 2,
          "SHA3-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA256": 1
          },
          "SHA3": {
            "SHA-3": 2,
            "SHA3-224": 2,
            "SHA3-256": 3,
            "SHA3-384": 2,
            "SHA3-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "SM2": 2
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 28,
          "PRNG": 1
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "Timing Attack": 1,
          "Timing Attacks": 2,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 12,
          "FIPS 180-4": 2,
          "FIPS 186-4": 4,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS 202": 2,
          "FIPS PUB 140-2": 2,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 198-1": 1,
          "FIPS PUB 202": 1,
          "FIPS186-4": 1
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-135": 1,
          "NIST SP 800-38A": 1,
          "NIST SP 800-38B": 2,
          "NIST SP 800-38C": 2,
          "NIST SP 800-38D": 2,
          "NIST SP 800-38E": 2,
          "NIST SP 800-38F": 2,
          "NIST SP 800-52": 1,
          "NIST SP 800-56A": 1,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 2,
          "NIST SP 800-90B": 1,
          "SP 800-131A": 1,
          "SP 800-135": 1,
          "SP 800-38A": 1,
          "SP 800-38B": 1,
          "SP 800-38C": 1,
          "SP 800-38D": 1,
          "SP 800-38E": 1,
          "SP 800-38F": 1,
          "SP 800-52": 1,
          "SP 800-56A": 1,
          "SP 800-57": 1,
          "SP 800-67": 2,
          "SP 800-90": 3,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS 1": 2,
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 5288": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 41,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 2,
            "Triple-DES": 19
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 10,
            "HMAC": 15
          }
        },
        "djb": {
          "Poly": {
            "Poly1305": 3
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 3
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1
        }
      },
      "vendor": {
        "Huawei": {
          "Huawei": 7,
          "Huawei Technologies Co": 34
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "rivas",
      "/CreationDate": "D:20220512145114+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220512145114+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 951895,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=33502"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 35
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "5e48f045d274be90083d44adef38bd7d7832e8bbbe2a803415f57d24a092c164",
    "policy_txt_hash": "705788bd92c0e38ce7464e7749b3601ce357839ba2427c31bd0ef59dab3bcca2"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2022_010622_0641_signed.pdf",
    "date_sunset": "2026-09-21",
    "description": "The Huawei EulerOS 2.0 OpenSSL Cryptographic Module is a software library supporting the implementation of Transport Layer Security (TLS) protocol v1.2 as well as general purpose approved cryptographic algorithms. The module provides cryptographic services to applications running in the user space of the underlying EulerOS 2.0 operating system through a C language application program interface (API).",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Huawei EulerOS 2.0 OpenSSL Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "1.1",
    "tested_conf": [
      "Huawei EulerOS 2.0 on FusionServer RH2288 with Intel Xeon E5-2690 processor. Huawei EulerOS 2.0 on Taishan200 with Kunpeng 920 processor."
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-05-25",
        "lab": "DEKRA Testing and Certification S.A.U",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Huawei Technologies CO., Ltd.",
    "vendor_url": "https://www.huawei.com"
  }
}